Network Synergy Blog

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Network Synergy can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 203.261.2201 to ensure your business is protected.

How to Keep IT and the Rest of Your Staff on the S...
Tip of the Week: Putting Your Old Android Device t...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Data Loss How To Twitter Content Filtering Computer Care BDR Intranet IT budget Logs Storage Mirgation Office Tips IT Management How To Secruity Bookmarks Phishing GPS IP Address Fax Server Leadership Miscellaneous Troubleshooting Best Available Saving Money Holiday Fleet Tracking Websites SharePoint Infrastructure IT Services Halloween Network Management Trending Crowdfunding communications Administrator Network Congestion Cameras Superfish VoIP Cryptocurrency Memory Shortcut Small Business Identity Theft Data Warehousing Efficiency Data Recovery Google Maps Wireless Computers Hacker Time Management Sports LiFi Spyware Managed Services Provider Consultation PC Care Undo Alt Codes Digital Payment People Relocation Phone System Business Management Mobile Office Big Data Innovation Google Wallet Statistics Travel Legal Disaster Recovery Cloud Computing Scheduling Public Speaking Streaming Media Screen Reader 5G Battery Redundancy Bandwidth Business Computing Hard Drives HIPAA Tip of the Week Start Menu Development Lithium-ion Battery Social Networking Charger Bring Your Own Device Software as a Service Customer Service Mobile Computing Public Cloud Printers Supercomputer Collaboration IT service Mobile Device Staff Finance Information Analyitcs Administration Printing Skype Servers Antivirus Remote Monitoring and Management Computer Smartphones Assessment Data Breach Mobile Data Operations Utility Computing Print Server Managing Stress eWaste Printer Motion sickness Tip of the Work Office Server Backups Encryption Food Emoji Outsourced IT Mobility Gadgets Webcam Hard Disk Drive Tip of the week Cables Website Meetings Fun Cyberattacks Automobile Licensing Safety Cache Wi-Fi Windows 10 Cortana IBM IT Consulting Managed Service Passwords Web Server Government IT Consultant Taxes Digital Signature Experience Managed IT services Business Continuity Regulation Upgrades Thank You Identity Cybersecurity Computing Regulations Law Firm IT YouTube Firewall E-Commerce Motherboard File Sharing Security Refrigeration USB Robot Notifications Disaster Current Events MSP Asset Tracking Password Favorites Maintenance Unified Threat Management Hosted Solution Monitoring Wireless Technology Office 365 Hard Drive Windows 10 Microsoft Excel Break Fix Google Drive Internet Personal Information Bitcoin Domains Paperless Office Patch Management Vulnerabilities Networking Downtime Proactive Alert Google Analytics Save Time Excel Backup Service-based Business Solid State Drive Education Users Physical Security Conferencing Politics Google Android Display Gmail Best Practices Spam Privacy Legislation Customer Relationship Management Word Workplace Tips Business Technology Inbound Marketing Smartphone Machine Learning Save Money Presentation Firefox Consulting Chatbots Competition Instant Messaging Congratulations Identities Cyber Monday Unified Threat Management Dark Web Unsupported Software Staffing Social Media Virtual Private Network Retail Distributed Denial of Service Project Management Document Management Running Cable Remote Support Permissions WiFi Operating System Buisness Server Management User Tips Read Only Artificial Intelligence Mobile eBay Wearable Technology Typing Windows Proactive IT Gadget Specifications Mobile Device Management Mobile Devices Data Management Internet of Things Upgrade Electronic Medical Records Technology Managed IT Service Hotspot Network Security Migration Social Engineering Data Backup VPN Cleaning Automation Electronic Health Records Work Station App Business Growth Data Security WPA3 Hackers iPhone Applications Cybercrime OneNote Browser Router Star Wars Samsung Piracy Technology Tips CIO Fraud Technology Laws Email Laptop Cookies Heating/Cooling Language Black Market Trainging Company Culture Software Saving Time Productivity Wires SaaS Remote Computing Budget Productivity Files Marketing Entrepreneur Facebook IT Support Smart Tech PowerPoint Humor Law Enforcement Tutorials Monitors Deep Learning Software Tips Hacking Programming Telephony Address Text Messaging Chromebook Employer-Employee Relationship Mobile Technology Search Scam Ransomware Black Friday CCTV Outlook Point of Sale Cooperation Writing Business Scary Stories Managed Service Provider Tech Support Video Surveillance Knowledge Enterprise Content Management Mobile Security Drones Features Microsoft Managed IT Computer Accessories Training Virtual Reality 3D Remote Workers High-Speed Internet Settings Tech Term Business Intelligence Environment User Alerts Uninterrupted Power Supply Computer Repair History Money User Error Data storage Communication Comparison Botnet Best Practice Google Docs Cloud Disaster Resistance IT Support Private Cloud Recycling Healthcare Business Owner Employee-Employer Relationship Augmented Reality Digital Gaming Console Processors Vulnerability CrashOverride Modem Virtual Desktop Quick Tips Network Remote Monitoring IT Solutions Work/Life Balance Virtualization Lenovo Apps Cost Management Computing Infrastructure Hacks Smart Technology Crowdsourcing Health Corporate Profile Chrome Help Desk Touchscreen Vendor Management Access Control Going Green Google Calendar Downloads Nanotechnology Debate Management BYOD Mail Merge Windows 8.1 Update Error Social PDF Tracking Hosted Solutions Unified Communications Microsoft Office Net Neutrality Data Application Documents Information Technology Bluetooth Avoiding Downtime Two-factor Authentication Macro Windows 8 Apple Flexibility Risk Management Mouse IT Technicians Webinar Virus Recovery Co-managed IT G Suite Enterprise Resource Planning Hiring/Firing Internet Exlporer The Internet of Things Connectivity Managed IT Services Telephone Systems End of Support Blockchain Tablet Geography Cabling 3D Printing Consumers IoT Sync Value Multi-Factor Security Malware Compliance Hardware LinkedIn Techology Online Currency

      Latest Blogs

      The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud nee...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube